{"id":"https://openalex.org/W2517677119","doi":"https://doi.org/10.1145/2976749.2989054","title":"POSTER","display_name":"POSTER","publication_year":2016,"publication_date":"2016-10-24","ids":{"openalex":"https://openalex.org/W2517677119","doi":"https://doi.org/10.1145/2976749.2989054","mag":"2517677119"},"language":"en","primary_location":{"id":"doi:10.1145/2976749.2989054","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2976749.2989054","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017730551","display_name":"Asya Mitseva","orcid":null},"institutions":[{"id":"https://openalex.org/I186903577","display_name":"University of Luxembourg","ror":"https://ror.org/036x5ad56","country_code":"LU","type":"education","lineage":["https://openalex.org/I186903577"]}],"countries":["LU"],"is_corresponding":true,"raw_author_name":"Asya Mitseva","raw_affiliation_strings":["University of Luxembourg, Luxembourg, Luxembourg"],"affiliations":[{"raw_affiliation_string":"University of Luxembourg, Luxembourg, Luxembourg","institution_ids":["https://openalex.org/I186903577"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101804733","display_name":"Andriy Panchenko","orcid":"https://orcid.org/0009-0004-2563-4234"},"institutions":[{"id":"https://openalex.org/I186903577","display_name":"University of Luxembourg","ror":"https://ror.org/036x5ad56","country_code":"LU","type":"education","lineage":["https://openalex.org/I186903577"]}],"countries":["LU"],"is_corresponding":false,"raw_author_name":"Andriy Panchenko","raw_affiliation_strings":["University of Luxembourg, Luxembourg, Luxembourg"],"affiliations":[{"raw_affiliation_string":"University of Luxembourg, Luxembourg, Luxembourg","institution_ids":["https://openalex.org/I186903577"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040435046","display_name":"Fabian Lanze","orcid":null},"institutions":[{"id":"https://openalex.org/I4210152223","display_name":"Huf H\u00fclsbeck & F\u00fcrst (Germany)","ror":"https://ror.org/04j24r737","country_code":"DE","type":"company","lineage":["https://openalex.org/I4210152223"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Fabian Lanze","raw_affiliation_strings":["Huf Secure Mobile GmbH, Velbert, Germany"],"affiliations":[{"raw_affiliation_string":"Huf Secure Mobile GmbH, Velbert, Germany","institution_ids":["https://openalex.org/I4210152223"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063048519","display_name":"Martin Henze","orcid":"https://orcid.org/0000-0001-8717-2523"},"institutions":[{"id":"https://openalex.org/I887968799","display_name":"RWTH Aachen University","ror":"https://ror.org/04xfq0f34","country_code":"DE","type":"education","lineage":["https://openalex.org/I887968799"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Martin Henze","raw_affiliation_strings":["RWTH Aachen University, Aachen, Germany"],"affiliations":[{"raw_affiliation_string":"RWTH Aachen University, Aachen, Germany","institution_ids":["https://openalex.org/I887968799"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078646305","display_name":"Klaus Wehrle","orcid":"https://orcid.org/0000-0001-8609-800X"},"institutions":[{"id":"https://openalex.org/I887968799","display_name":"RWTH Aachen University","ror":"https://ror.org/04xfq0f34","country_code":"DE","type":"education","lineage":["https://openalex.org/I887968799"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Klaus Wehrle","raw_affiliation_strings":["RWTH Aachen University, Aachen, Germany"],"affiliations":[{"raw_affiliation_string":"RWTH Aachen University, Aachen, Germany","institution_ids":["https://openalex.org/I887968799"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009071576","display_name":"Thomas Engel","orcid":"https://orcid.org/0000-0002-7374-3927"},"institutions":[{"id":"https://openalex.org/I186903577","display_name":"University of Luxembourg","ror":"https://ror.org/036x5ad56","country_code":"LU","type":"education","lineage":["https://openalex.org/I186903577"]}],"countries":["LU"],"is_corresponding":false,"raw_author_name":"Thomas Engel","raw_affiliation_strings":["University of Luxembourg, Luxembourg, Luxembourg"],"affiliations":[{"raw_affiliation_string":"University of Luxembourg, Luxembourg, Luxembourg","institution_ids":["https://openalex.org/I186903577"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5017730551"],"corresponding_institution_ids":["https://openalex.org/I186903577"],"apc_list":null,"apc_paid":null,"fwci":0.8569,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.84017175,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1766","last_page":"1768"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5388132929801941}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5388132929801941}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2976749.2989054","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2976749.2989054","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6000000238418579,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G5840483068","display_name":null,"funder_award_id":"PETIT Junior Core Track","funder_id":"https://openalex.org/F4320321038","funder_display_name":"Fonds National de la Recherche Luxembourg"},{"id":"https://openalex.org/G7481297249","display_name":null,"funder_award_id":"H2020 Privacy Flag","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"}],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"},{"id":"https://openalex.org/F4320321038","display_name":"Fonds National de la Recherche Luxembourg","ror":"https://ror.org/039z13y21"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W1450140837","https://openalex.org/W2080429359","https://openalex.org/W2149280729","https://openalex.org/W2153635508","https://openalex.org/W2272516773"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2478288626","https://openalex.org/W4391913857","https://openalex.org/W2350741829","https://openalex.org/W2530322880"],"abstract_inverted_index":{"The":[0],"website":[1],"fingerprinting":[2,36,63,87],"attack":[3,88,149],"aims":[4],"to":[5,104,110,114,133,156],"infer":[6],"the":[7,18,50,67,80,83,95,120,129,137,140,143,148],"content":[8],"of":[9,52,69,82,108,119],"encrypted":[10],"and":[11,26,73,142,147],"anonymized":[12],"connections":[13,109],"by":[14],"analyzing":[15],"patterns":[16],"from":[17],"communication":[19],"such":[20],"as":[21],"packet":[22],"sizes,":[23],"their":[24],"order,":[25],"direction.":[27],"Although":[28],"recent":[29],"study":[30],"has":[31],"shown":[32],"that":[33,79],"no":[34],"existing":[35],"method":[37],"scales":[38],"in":[39,43,66,126],"Tor":[40,53,70,96],"when":[41],"applied":[42,65],"realistic":[44],"settings,":[45],"this":[46,57],"does":[47],"not":[48],"consider":[49],"case":[51],"hidden":[54,71,90,111,158],"services.":[55],"In":[56,124],"work,":[58],"we":[59],"propose":[60],"a":[61,157],"two-phase":[62],"approach":[64],"scope":[68],"services":[72,91,112],"explore":[74],"its":[75,115],"scalability.":[76],"We":[77],"show":[78],"success":[81],"only":[84],"previously":[85],"proposed":[86],"against":[89],"strongly":[92],"depends":[93],"on":[94,136],"version":[97],"used;":[98],"i.e.,":[99],"it":[100],"may":[101],"be":[102,134,151],"applicable":[103],"less":[105],"than":[106],"1.5%":[107],"due":[113],"requirement":[116],"for":[117,153],"control":[118],"first":[121,144],"anonymization":[122,145],"node.":[123],"contrast,":[125],"our":[127],"method,":[128],"attacker":[130],"needs":[131],"merely":[132],"somewhere":[135],"link":[138],"between":[139],"client":[141],"node":[146],"can":[150],"mounted":[152],"any":[154],"connection":[155],"service.":[159]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-09-16T00:00:00"}
